Share us:
 

it functionality

Results 226 - 250 of 307Sort Results By: Published Date | Title | Company Name
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services, security, deployment, it management, platforms, email security, messaging, cloud computing
    
SilverSky
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center, cloud business email providers, it management, email security, microsoft exchange, information management, messaging, cloud computing
    
SilverSky
Published By: Oracle     Published Date: Nov 21, 2013
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : 
marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation, lead routing, lead management, email marketing, lead scoring, database marketing, oracle, eloqua, business intelligence, data integration, data mining
    
Oracle
Published By: Oracle     Published Date: Jan 22, 2014
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : 
marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation, lead routing, lead management, email marketing, lead scoring, database marketing, oracle, eloqua, data integration, data mining
    
Oracle
Published By: Oracle     Published Date: Jan 22, 2014
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : 
marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation, lead routing, lead management, email marketing, lead scoring, database marketing, oracle, eloqua, data integration, data mining
    
Oracle
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service, business users, analytic solution, share data, performance management, supply chain management, customer relationship, cognos insight, business continuity, internet security, business activity monitoring, business analytics
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.
Tags : 
ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance, risk management
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality, it management
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Self-service analytics implies that users design and develop their own reports and do their own data  analysis with minimal support by IT. Most recently, due to the availability of tools, such as those from Qlik,  Spotfire, and Tableau, self-service analytics has become immensely popular. Besides powerful analytical  and visualization capabilities, they all support functionality for accessing and integrating data sources.  With respect to this aspect of data integration four phases can be identified in the relatively short history  of self-service analytics. This whitepaper describes these four phases in detail and shows how the tools  Cisco Data Preparation (CDP) and Cisco Information Server (CIS) for data virtualization can strengthen and  enrich the self-service data integration capabilities of tools for reporting and analytics.  
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cobalt Data Centers     Published Date: Jul 24, 2014
IT organizations use colocation centers for a variety of reasons, but not all colocation providers offer the same value and functionality, and many come with inherent risks. When choosing a colocation provider, careful consideration is essential. This guide will show you how to choose the right provider.
Tags : 
cobalt, cobalt data centers, data center, racks, blades, storage, data storage, cloud computing, virtualization, storage management, backup and recovery, blade servers, storage virtualization, server virtualization, data center design and management, colocation and web hosting
    
Cobalt Data Centers
Published By: Epicor     Published Date: Sep 25, 2014
The software as a service (SaaS) model of application delivery, more commonly known as ‘cloud deployment’, in which software features are accessed through a Web browser, is an excellent way for manufacturing companies to get the bene?ts of enterprise resource planning (ERP) systems without the need to build additional IT infrastructure. ERP functionality delivered “from the cloud” avoids the complexity and costs that often accompany on premisess ERP implementations, and typically provides a much more favorable total cost of ownership, compared to legacy on premisess deployment. Companies subscribe to the software features that they need and can add new ones as business requirements change, without buying additional servers or storage to support new functionality. The ERP features are the same as for an on premises ERP system, except that it is hosted and maintained on the Cloud provider’s infrastructure.
Tags : 
saas, cloud deployment, cloud erp, it infrastructure, software features, application delivery, it management, data management
    
Epicor
Published By: Cask     Published Date: Feb 04, 2015
It’s time for business applications to include Big Data functionality, and it’s time for developers to get on the Big Data train. This webinar will focus on how to make that happen.
Tags : 
cask, hadoop, big data, application development, big data application development, application integration, enterprise software, database development, software testing, web development, data warehousing
    
Cask
Published By: Altiscale     Published Date: May 28, 2015
Big Data technologies are maturing and quickly moving into the next phase - one that expands in data use-cases as Hadoop moves into more influential roles throughout IT infrastructures. In this just-released report, Gartner is recognizing four Big Data vendors as "cool." Gartner says these vendors can meaningfully and synergistically combine multiple types of functionality.
Tags : 
big data, vendors, functionality, cool vendors, consistent performance, it management, data management; add - gartner, hadoop, data management
    
Altiscale
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis, networking, security, it management
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable.
Tags : 
data, business practices, data management, data security, software, applications, network management, network performance, security management, application integration, application performance management, best practices, productivity
    
Cisco
Published By: Act-On     Published Date: Jan 20, 2012
Do you wish your email marketing system delivered just a bit more functionality? Are you spending lots of time managing multiple tools and correlating the data they provide? Would it be useful if your CRM and email were tightly integrated? Maybe it's time to consider a marketing automation solution. This new report from Gleanster Research will help you.
Tags : 
email marketing, marketing automation, marketing solutions, automation solutions
    
Act-On
Published By: Cactus Commerce     Published Date: Jul 20, 2011
Download this whitepaper to gain insight into retailers that were faced with the challenge of presenting the best possible online experience and how they were able to offer extended features and functionality to their customers.
Tags : 
cactus commerce, commercelive, microsoft e-commerce, cross channel e-commerce solution, e-commerce platform, digital e-commerce solution, e-commerce web design, sharepoint ecommerce solution, digital commerce, user experience
    
Cactus Commerce
Published By: Jive     Published Date: Feb 12, 2015
The Forrester Wave can help your organization in evaluating an enterprise social platform. The full report covers 13 vendors with specific information on core functionality and strategy.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
Published By: Sophos     Published Date: May 09, 2013
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.
Tags : 
network protection, sophos, buyers guide, security, application security, security software, firewall, vpn, scanning, spam, network performance, network security, anti spam, anti spyware, anti virus, firewalls, hacker detection, intrusion detection, intrusion prevention, data protection
    
Sophos
Published By: Cisco     Published Date: Nov 18, 2015
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources. The following questions were posed by Cisco to Nolan Greene, research analyst with IDC's Network Infrastructure group, on behalf of Cisco's SMB customers.
Tags : 
cisco, idc, mobility, network, smbs, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
cisco systems, mobility, going digital, midsize businesses, smb, mobility infrastructure, networking, it management, wireless, enterprise applications, data management
    
Cisco
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Business Software     Published Date: Apr 04, 2013
More and more, manufacturers realize, that for increased productivity, they need a fully integrated, job-based manufacturing software system that has functionality for quoting, scheduling, job tracking, costing, purchasing, performance metrics and customer relationship management to name a few. In this white paper, Business-Software.com profiles the leading discrete manufacturing software vendors.
Tags : 
business-software.com, top 15 vendors, discrete manufacturing software, revealed
    
Business Software
Published By: Business Software     Published Date: May 28, 2013
What is Financial Management Software? Financial management software solutions allow organizations to more effectively and accurately control and manage financial operations throughout the entire business – including across multiple companies, subsidiaries, divisions, countries, and sites. With powerful features and functionality, financial management systems dramatically streamline and enhance the way vital financial data is collected, processed, stored, accessed, and presented to users within, and beyond, the enterprise.
Tags : 
business software, divisions, financial management, finance
    
Business Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service